New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks XDR-Analyst - Palo Alto Networks XDR Analyst

Page: 3 / 3
Total 91 questions

Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident?

A.

Sensor Engine

B.

Causality Analysis Engine

C.

Log Stitching Engine

D.

Causality Chain Engine

When creating a BIOC rule, which XQL query can be used?

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

What motivation do ransomware attackers have for returning access to systems once their victims have paid?

A.

There is organized crime governance among attackers that requires the return of access to remain in good standing. B. Nation-states enforce the return of system access through the use of laws and regulation.

B.

Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.

C.

The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions. -

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?

A.

Cortex XDR Pro per TB

B.

Host Insights

C.

Cortex XDR Pro per Endpoint

D.

Cortex XDR Cloud per Host

Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?

A.

Search & destroy

B.

Isolation

C.

Quarantine

D.

Flag for removal

What kind of the threat typically encrypts user files?

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)

A.

The agent technical support file.

B.

The prevention archive from the alert.

C.

The distribution id of the agent.

D.

A list of all the current exceptions applied to the agent.

E.

The unique agent id.